1 VPN TECHNOLOGIES cc Connecting you anywhere anytime CC 1999/012869/23 Introduction Founded by Jaco Lange in February 2004, VPN Technologies is an information technology consulting company that has its foundation established on professionalism and integrity. The company firmly believes in honest trading and highly values the trust of its clients. The company strives to provide a personal technical service that is dependable and consistent and economically viable. It aims to deliver sound advice and direction, backed by individuals who have more then 10 years of extensive knowledge and experience in their relevant fields. These individuals have good reputations and references within the marketplace. Services The company covers the following aspects of IT: - Design and implementation of Local and Wide area networks and Internet connectivity. Networking support for servers and workstations i.e. hardware, software installation, maintenance, administration and troubleshooting. Aspects of security covered include firewalling, routing, intrusion detection systems, remote dial-in access, VPN connectivity, vulnerability assessments, virus and spyware detection, removal and prevention. Redundancy and hardware fail-over for mission critical servers. Service level agreements (SLA s) for clients desiring quicker response times and the peace of mind that the general up keep of the network infrastructure is maintained and is frequently monitored to ensure minimum downtime. Auditing and inventories of software and hardware. The installing of legal evaluations of software to provide try before you buy scenarios to avoid disillusionment. Quoting and purchasing of hardware, software and peripherals. Other personalized recommendations that differ from network to network.
2 Products 1. LINUX The Linux Firewall is a 3 port high performance Linux Iptables Firewall, incorporating broadband connectivity and VPN functionality, see Attachment (a) 2. MailScanner is already a highly-respected open source security system, with more users than AOL and Hotmail combined, and this new release increases its stability and performance. It processes 500 million messages every day, removing 2 million viruses and identifying 75 million spam messages. MailScanner is used at 20,000 sites around the world protecting top government departments, commercial corporations and educational institutions. See Attachment (b) 3. BackupPC is a high-performance, enterprise-grade system for backing up Linux andwinxx PCs and laptops to a server's disk. BackupPC is highly configurable. See Attachment 4. VOIP - Elastix is an appliance software that integrates the best tools available for Asterisk-based PBXs into a single, easy-to-use interface. It also adds its own set of utilities and allows for the creation of third party modules to make it the best software package available for open source telephony. The goals of Elastix are reliability, modularity and ease-of-use. These characteristics added to the strong reporting capabilities make it the best choice for implementing an Asterisk-based PBX. 5. Novell GroupWise 8 combines the widest possible range of collaborative tools in a truly plugged-in work environment. , instant messaging, calendaring, contacts and task management have all been significantly enhanced while retaining the familiarity that helps current GroupWise users upgrade effortlessly. Nothing else plugs you into the Web 2.0 world as thoroughly as GroupWise 8 or makes it look so good and so easy once you re there.
3 Qualifications Certifications and experience existing within the company and its associated partners include Cisco, Microsoft, Novell, Hp Compaq, Linux as well as a number of other market related vendors. Service Level Agreements The two-fold vision of VPN Technologies towards the SLA client would be to assess the unique requirements of the company, then implement and maintain a policy that the client and consultant understand and are comfortable with. Secondly, the consultancy commits to maximizing the potential that information technology has to offer both to the professional image and productivity of the client. This would be reviewed regularly to ensure that the customers IT environment is synergetic with the evolving IT industry. The company will endeavor to: - Respond in a favorable time frame to urgent problems or queries. (Priority levels exist for various scenarios) Attend to general customer requests. Take regular preventative maintenance steps to ensure that the stability, operability and proper functionality of the existing network infrastructure are maintained: - Drawing up of detailed network diagrams. Ensuring that the operational and application patch levels are current on servers and workstations.installation of new hardware and software wherever required. The performing and testing of system reloads wherever deemed necessary. Validation of existing tape and hardware backups. Monitoring the mission critical systems hardware level (i.e. memory, hard drive, external peripherals etc) Implementing a strong security policy for the network and keeping it current. Reports can be generated on a monthly basis detailing the Internet activity and usage. Maintaining a set standard both in terms of hardware and software. Monitoring and isolating of viruses and spy ware. Certain hardware can be arranged if failure occurs on the network i.e. server s, routers, switches etc, tape streamers etc. Remote support offerings for general administration. An accurate log of visits will be kept.
4 CLIENTS Bullbrand Foods, Contact Mr Sias Rabie Sabila Air & Sea JHB, Contact Mr Sven Weiswange Sabila Air & Sea DBN, Contact Mr Alvin Naidoo Sabila Air & Sea CPT, Contact Mr Len Penn Falcon Electronics, Contcat: Mr Ian Booysen Mvela Phanda Construction, (Pty) Ltd, Contact:Mr Nillesh Bhima Emfuleni Local Council, Contact: Mr Paul Erenst Sedibeng District Council, Contact: Yusuf Chamda Midvaal Local Council, Contact: Mr Andre Mans CoreFreight (Pty) Ltd, Contact: Mr Jonathan Simms BVI Consulting Engineers, Contact: Mr Corniel van Wijk Berry & Donaldson, Contact: Mr Chris Lane CargoXchange, Contact: Mr Pedro Da Costa Huurkor (PTY.) LTD. Contact: Ben Bodenstein Du Plessis & Eksteen, Contact: Mr Thomas Stofberg Hydrotec, Contact: Hendry Bouwer Verref, Contact: Mrs Carina Dippenaar ProAdmin (PTY) LTD, Contact: Mr Wilhelm Jooste Sub contracting for NIT, Contact: Mr Herman Ploeger o Goscor o Esor Franki Africa o Electrahertz, o Morgan Group
5 CISCO S YSTEMS CISCOSYSTEMS IBM TELKOM ADSL Network INTERNET CISCOSYSTEMS CISCO S YSTEMS Attachment (1) Linux Firewall The Linux Firewall is a 3 port high performance Linux Iptables Firewall, incorporating broadband connectivity and VPN functionality. Features: Iptables firewall ADSL support Traffic graphs Transparent web proxy Web content filter DMZ support Dynamic DNS VPN IPSec VPN Compression VPN triple-des" encryption Dynamic DNS IPSec support VPN - PPTP L2TP & GRE tunneling Intrusion detection DHCP - client and server Traffic shaping (QoS) DNS proxying Unlimited users! As more and more small businesses are discovering the benefits of high-speed connections to the Internet, they are also looking for ways to use the Internet as a way to communicate within their company. Instead of using leased-lines to connect remotely, the Internet is seen as the new medium to cost-effectively transmit company data. Using a public domain to send private data has severe security concerns and can create liabilities, especially when unethical persons use methods to read or sniff the valuable data being transmitted. An effective way to prevent private data from being read is to scramble or encrypt the data prior to being sent, and then unscrambling or decrypting the data at the intended destination. Establishing this encrypting and decrypting methodology over the public Internet is known as setting up a Virtual Private Network, or VPN. The Firewall offers the ability to establish these VPN tunnels, allowing for a company to provide secure access to intranet data over the internet, Further more the data in the VPN tunnel is compressed and thus maximizing the transfer speed. VPN Technologies offer cost-effective, scalable and secure networking solutions to meet your specific business needs. VPN Solutions offer clear benefits, including operational flexibility, easy customer access and therefore, improved service and streamlined sharing of information and business applications Hardware Requirements: Processor Pentium II 300 MHZ Memory - 256Mb 10 GB HDD WAN port - x10/100baset LAN port - 1x10/100BaseT DMZ port 1 x 10/100baseT Linux NMS Johannesburg Firewall VPN server WS Netware Marconi ADSL Router Wynberg Durban Firewall VPN server W2K server IIS Webserver MS SQL Marconi ADSL Router Netware 512/256 ADSL 512/256 ADSL Mauritius User conenct via VPN ISP Mailserver Webservers ISP Network Remote User conenct via VPN 512/256 ADSL WS Cape Town Firewall VPN server Marconi ADSL Router Contact: Jaco Lange PE Netware
6 Attachment (2) MailScanner Spam (unsolicited commercial ) accounts for 35% of all messages and is rapidly increasing. 1 in 150 messages contains a virus, costing many billions of dollars around the world every year. There are currently something in the order of 15,000-20,000 sites using MailScanner. The entire log can be viewed on a webpage MailScanner is already a highly-respected open source e- mail security system, with more users than AOL and Hotmail combined, and this new release increases its stability and performance. It processes 500 million messages every day, removing 2 million viruses and identifying 75 million spam messages. MailScanner is used at 20,000 sites around the world protecting top government departments, commercial corporations and educational institutions. MailScanner scans all for viruses, spam and attacks against security vulnerabilities. It is not tied to any particular virus scanner, but can be used with any combination of 14 different virus scanners, allowing sites to choose the "best of breed" virus scanner. Being open source, site administrators can audit and verify the integrity of the system. Its role is a major part in the security of a network, and so it must act as a trusted service. The only way to achieve the required level of trust is to be open source, an approach the commercial suppliers are not willing to take. MailScanner has been developed in a world-leading Electronics and Computer Science Department at the University of Southampton. MailScanner users SpamAssassin to identify SPAM, the spam-identification tactics used include: header analysis: spammers use a number of tricks to mask their identities, fool you into thinking they've sent a valid mail, or fool you into thinking you must have subscribed at some stage. SpamAssassin tries to spot these. text analysis: again, spam mails often have a characteristic style (to put it politely), and some characteristic disclaimers and CYA text. SpamAssassin can spot these, too. blacklists: SpamAssassin supports many useful existing blacklists, such as mail-abuse.org, ordb.org or others. Mail Relayed Daily Graph Hardware Requirements: Pentium 4 2 GHZ 512Mb RAM 40 GB Hard disk 1 X Network card Spam Identified Daily Graph Razor: Vipul's Razor is a collaborative spamtracking database, which works by taking a signature of spam messages.
7 Attachment (3) BackupPC is a high-performance, enterprise-grade system for backing up Linux andwinxx PCs and laptops to a server's disk. BackupPC is highly configurable A clever pooling scheme minimizes disk storage and disk I/O. Identical files across multiple backups of the same or different PCs are stored only once resulting in substantial savings in disk storage and disk I/O. One example of disk use: 95 latops with each full backup averaging 3.6GB each, and each incremental averaging about 0.3GB. Storing three weekly full backups and six incremental backups per laptop is around 1200GB of raw data, but because of pooling and compression only 150GB is needed. Optional compression support further reducing disk storage. Since only new files (not already pooled) need to be compressed, there is only a modest impact on CPU time. No client-side software is needed. The standard smb protocol is used to extract backup data on WinXX clients. On linux clients, tar over ssh/rsh/nfs is used to backup the data. With version 2.0.0, rsync is also supported on any client that has rsync or rysncd. A powerful web (http/cgi) user interface allows administrators to view log files, configuration, current status and allows users to initiate and cancel backups and browse and restore files from backups. A full set of restore options is supported, including direct restore (via smbclient, tar, or rsync/rsyncd) or downloading a zip or tar file. Supports mobile environments where laptops are only intermittently connected to the network and have dynamic IP addresses (DHCP). Flexible configuration parameters allow multiple backups to be performed in parallel, specification of which shares to backup, which directories to backup or not backup, various schedules for full and incremental backups, schedules for reminders to users and so on. Configuration parameters can be set system-wide or also on a per-pc basis. Users are sent periodic reminders if their PC has not recently been backed up. content, timing and policies are configurable. Tested on Linux, Freenix and Solaris hosts, and Linux, Win95, Win98, Win2000 and WinXP clients.
8 VoIP PBX Call recording with a Web interface to search recordings Voic and Voic -to- functionality Flexible IVR configurable by a Web Inteface. Voice synthesis support Extension Batch Tool to create large numbers of extensions using CSV files. Integrated Echo Canceller Phone provisioner, configurable via a Web Interface. Allows configuration of a large number of IP phones in a short time for supported phones. Support for video phones Hardware detection interface allowing quick & easy setup of a range of popular telephony hardware. ntegrated DHCP server to dynamically assign IPs to the IP-Phones Operator panel. Monitor PBX activity via a graphical interface and perform call transfers and parkings by a simple drag-n-drop. * Call parking allowing calls to be picked up at any extension. Call Detail (CDRs) report within you can search calls based on different criteria as date, extension number, etc Billing report from which you can filter by destination, source Report of channels used by technology (SIP, ZAP, IAX, Local, H323) Support for call queues including static and dynamic agents Conference Center. Allows setup of temporary scheduled conferences or static conference rooms via Web Interface * Support the following protocols: SIP, IAX, H323, MGCP, SKINNY, etc Supported codecs: ADPCM, G.711 (A-Law & μ-law), G.722, G (pass through), G.726, G.729 (through a commercial license), GSM, ilbc Support for analog interfaces as FXS/FXO (PSTN/POTS) Support for digital interfaces as E1/T1/J1 through protocols as PRI/BRI/R2 Support for bluetooth interfaces through cell phones (chan_mobile) Caller ID supported. Multiple Trunk support. Incoming and outgoing routes with support dial pattern matching which gives flexibility Follow-me support Support for ring groups Support for paging and intercom for supported IP Phones Support for call routing based on Time Conditions Support for PIN sets Direct Inward System Access (DISA) - Direct access to the PBX via External Line Callback * Web based file editor to manually edit the Asterisk configuration files Web based interface to the Asterisk console called the CLI FAX Fax server based on HylaFax The fax functionality is administrable via Web Fax visor integrated. The faxes can be downloaded from the Web in PDF format * Fax-to- application The template (from fax-to- ) can be customized Access control for fax clientes (white list)
9 GroupWise 8 Novell GroupWise 8 raises the bar on user productivity with the first fully connected collaborative space for knowledge workers. Built for today s social enterprise networking, the highly connected, collaborative GroupWise 8 workspace leverages Web 2.0 resources to enhance every interaction. Access wikis and blogs right from your mailbox. Add favorite Web pages to your Home View panels. Publish your calendar inside and outside the enterprise, so anyone you work with can do a busy search on your time. Novell GroupWise 8 empowers you and your colleagues to reach new heights of personal productivity connecting, communicating and collaborating to drive business success for your enterprise. GroupWise works the way you do.
Manual 3CX Phone System for Windows Version 9.0 Copyright 2006-2010, 3CX ltd. http:// E-mail: email@example.com Information in this document is subject to change without notice. Companies names and data used
15-601041 Issue 27.01.0 (Thursday, September 26, 2013-12:22 PM) 2013 AVAYA All Rights Reserved. Notice While reasonable efforts have been made to ensure that the information in this document is complete
Product Overview for Windows Small Business Server 2011 December 2010 Abstract Microsoft offers Windows Small Business Servers as a business solution for small businesses by providing a simplified setup,
Table of Contents Introduction... 3 What is VoIP... 3 What is Asterisk... 4 Benefits and Costs... 6 Design... 9 Setting Requirements... 9 Core Selection/Distribution Selection... 9 VoIP, PSTN, Internet...
Evaluation Guide: How to Select a Hosted Communications Introduction If you are considering alternatives to an on-premises communications system, you need to thoroughly understand the issues and options.
REQUEST FOR PROPOSAL ( RFP ) for MAINFRAME OUTSOURCING, MANAGED HOSTING AND ENTERPRISE COMPUTER PRINT SERVICES Specification No. 81207 Required for use by: CITY OF CHICAGO (Department of Innovation and
Trend Micro InterScan Messaging Security Suite Certification Training Course Student Textbook Information in this document is subject to change without notice, The names of companies, products, people,
Nesox Email Marketer White Paper www.nesox.com Title: Technology white paper Version: 1.5 Author: Copyright number: Adnil Zhou 2005SR02878 Date: 2007.1.20 2007 Nesox Solutions, all rights reserved. January,
CHARTER BUSINESS INTERNET PLUS Interactive welcome kit 800.314.7195 Charter-Business.com CB.016.intCD.0210 CHARTER BUSINESS INTERNET PLUS 2 ADDITIONAL INFO Thank you for choosing Charter Business INTERNET
SA-Announce Notification Platform User Manual for ShoreTel Version 9.0.17 About Syn-Apps Syn-Apps L.L.C. was founded in 2001 as a consulting firm focused on developing software for IP telephony platforms.
Solutions for Systems Management Tools for managing large-scale deployments of Mac computers in Education White Paper October 2008 Contents Page 3 Page 5 Page 7 Page 8 Page 11 Page 19 Introduction Systems
Secure Gateway for Windows Administrator s Guide Secure Gateway for Windows Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance of the End User
Cloud Computing White Paper Cloud Computing the facts Zed One Technology One, Kingsmill Business Park, Kingston upon Thames, Surrey, KT1 3GZ t: +44 (0)20 3326 0222 f: +44 (0)20 3326 0201 e: firstname.lastname@example.org
Firewall Strategies June 2003 (Updated May 2009) 1 Table of Content Executive Summary...4 Brief survey of firewall concepts...4 What is the problem?...4 What is a firewall?...4 What skills are necessary
PORTA ONE Porta SIP TM Administrator Guide Maintenance Release 16 www.portaone.com Porta SIP PortaSIP Administrator Guide Copyright Notice & Disclaimers Copyright 2000-2007 PortaOne, Inc. All rights reserved.
Widgets, Inc. Network Assessment Report Prepared by: Tech Name, Senior Enterprise Engineer Date: February 10, 2012 The Network Support Company 7 Kenosia Avenue, Suite 2B Danbury, CT 06810 (203) 744-2274
Microsoft Dynamics GP Planning for Security Copyright Copyright 2012 Microsoft. All rights reserved. Limitation of liability This document is provided as-is. Information and views expressed in this document,
The Definitive IP PBX Guide Understand what an IP PBX or Hosted VoIP solution can do for your organization and discover the issues that warrant consideration during your decision making process. This comprehensive
Front cover Introducing Windows Small Business Server 2003 on IBM Eserver xseries Servers Describes the products from Microsoft and IBM Explains how to install Windows Small Business Server 2003 Suggests
WHITE PAPER Virtual Office and PBX Systems For Small to Medium Businesses A Special Report by Questar TeleCommunications Unified Communications Division Saturday, December 4, 2010 by Ernest O'Dell Questar
Building Telephony Systems with Asterisk An easy introduction to using and configuring Asterisk to build feature-rich telephony systems for small and medium businesses David Gomillion Barrie Dempster BIRMINGHAM
Technical Paper Intranet Infrastructure Solutions for Small and Medium Enterprises A Case Study Analysis Intranet Infrastructure Solutions for Small and Medium Enterprises A Case Study Analysis Contents
Copyright 2006-2013, 3CX Ltd. http://www.3cx.com E-mail: email@example.com Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious unless